A curated list of papers ordered by number of citations. Last updated 2019-12-10

#Title
Citations
1.Bitcoin: A Peer-to-Peer Electronic Cash System Nakamoto, Satoshi. 2008
8492
2.Pricing via processing or combatting junk mail Dwork, Cynthia and Naor, Moni. 1992
1268
3.The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication Vukolić, Marko. 2015
551
4.Cryptocurrencies without proof of work Bentov, Iddo and Gabizon, Ariel and Mizrahi, Alex. 2016
200
5.Primecoin: Cryptocurrency with prime number proof-of-work King, Sunny. 2013
117
6.High Parallel Complexity Graphs and Memory-Hard Functions Alwen, Jo\"el and Serbinenko, Vladimir. 2015
67
7.Publicly Verifiable Proofs of Sequential Work Mahmoody, Mohammad and Moran, Tal and Vadhan, Salil. 2013
45
8.Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks Boneh, Dan and Corrigan-Gibbs, Henry and Schechter, Stuart. 2016
40
9.Non-interactive proofs of proof-of-work Aggelos Kiayias and Andrew Miller and Dionysis Zindros. 2017
37
10.Hostile blockchain takeovers (short paper) Joseph Bonneau. 2018
26
11.Simple Proofs of Sequential Work Bram Cohen and Krzysztof Pietrzak. 2018
25
12.Cuckoo Cycle: a memory bound graph-theoretic proof-of-work Tromp, John. 2015
22
13.TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake Chepurnoy, Alexander and Duong, Tuyet and Fan, Lei and Zhou, Hong-Sheng. 2017
20
14.Proofs of Proofs of Work with Sublinear Complexity Kiayias, Aggelos and Lamprou, Nikolaos and Stouka, Aikaterini-Panagiota. 2016
19
15.Lay down the common metrics: Evaluating proof-of-work consensus protocols’ security Zhang, Ren and Preneel, Bart. 2019
16
16.Proofs of Work for Blockchain Protocols Garay, Juan A and Kiayias, Aggelos and Panagiotakos, Giorgos. 2017
9
17.Proof-of-Work Sidechains Kiayias, Aggelos and Zindros, Dionysis. 2018
9
18.(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work Philip Daian and Ittay Eyal and Ari Juels and Emin G\"un Sirer. 2017
8
19.Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition Fitzi, Matthias and Gazi, Peter and Kiayias, Aggelos and Russell, Alexander. 2018
8
20.Communication complexity of byzantine agreement, revisited Abraham, Ittai and Chan, TH and Dolev, Danny and Nayak, Kartik and Pass, Rafael and Ren, Ling and Shi, Elaine. 2018
8
21.Proofs of Work from Worst-Case Assumptions Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan. 2018
7
22.Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme Itai Dinur and Niv Nadler. 2017
4
23.StrongChain: Transparent and Collaborative Proof-of-Work Consensus Szalachowski, Pawel and Reijsbergen, Dani\"el and Homoliak, Ivan and Sun, Siwei. 2019
4
24.Incremental proofs of sequential work D\"ottling, Nico and Lai, Russell WF and Malavolta, Giulio. 2019
4
25.Flux: Revisting Near Blocks for Proof-of-Work Blockchains Alexei Zamyatin and Nicholas Stifter and Philipp Schindler and Edgar Weippl and William J. Knottenbelt. 2018
3
26.Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gazi and Sarah Meiklejohn and Edgar Weippl. 2019
3
27.Load Thresholds for Cuckoo Hashing with Overlapping Blocks Walzer, S.. 2017
2
28.The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms Marcella Hastings and Nadia Heninger and Eric Wustrow. 2018
2
29.Flyclient: Super-Light Clients for Cryptocurrencies. B\"unz, Benedikt and Kiffer, Lucianna and Luu, Loi and Zamani, Mahdi. 2019
2
30.Iterated Search Problems and Blockchain Security under Falsifiable Assumptions Garay, Juan A and Kiayias, Aggelos and Panagiotakos, Giorgos. 2019
1
31.Reversible Proofs of Sequential Work Abusalah, Hamza and Kamath, Chethan and Klein, Karen and Pietrzak, Krzysztof and Walter, Michael. 2019
1
32.Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System Gao, Shang and Li, Zecheng and Peng, Zhe and Xiao, Bin. 2019
1
33.Pitchforks in Cryptocurrencies: Enforcing Rule Changes Through Offensive Weippl, Edgar. 2018
0
34.Just Enough Security: Reducing Proof-of-Work Ecological Footprint Tsabary, Itay and Spiegelman, Alexander and Eyal, Ittay. 2019
0